Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Citations
389 citations
Cites methods from "Mona: Secure Multi-Owner Data Shari..."
...tect the content of private data in the cloud, this user can also encrypt data before outsourcing it into the cloud server with encryption techniques [30], [31], such as the combination of symmetric key encryption and attribute-based encryption (ABE) [30]....
[...]
265 citations
Cites background from "Mona: Secure Multi-Owner Data Shari..."
...To ensure the privacy of cloud shared data at the same time, additional mechanisms, such as [24], can be utilized....
[...]
224 citations
Cites methods from "Mona: Secure Multi-Owner Data Shari..."
...Then, we will describe how to construct our public auditing mechanism for shared data based on this proxy re-signature scheme in the next section....
[...]
205 citations
Cites methods from "Mona: Secure Multi-Owner Data Shari..."
...Thus, regardless of the length of the message to be signed (i.e., |m| ), the signature length of our scheme and Mona is 1443 bits or approximately 180 bytes, while TPP requires 2691 bits or roughly equal to 336 bytes....
[...]
...3(c) shows that our scheme is almost the same as TPP but superior to that of Mona....
[...]
...In [17], a secure scheme was proposed to support anonymous data sharing in cloud computing....
[...]
...Considering the data sharing situation, in Mona, the cloud holding the vital RL can easily perform a collusion attack with any users (i.e., valid users and revoked users)....
[...]
...Specifically, operations for key generation in Mona is 3Cw + (r + 5)Cp + 1Cm , where the number of point multiplications are advanced with the increase in the number of revoked users (i.e., r )....
[...]
195 citations
References
9,282 citations
"Mona: Secure Multi-Owner Data Shari..." refers background in this paper
...Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership....
[...]
5,110 citations
4,257 citations
"Mona: Secure Multi-Owner Data Shari..." refers background in this paper
...First, identity privacy is one of the most significant obstacles for the wide deployment of cloud computing....
[...]
3,697 citations
2,016 citations